answersLogoWhite

0


Best Answer

A magic disk usually contains a set of tools that they have compiled for their activities. This disk might contain viruses, war-dialers, serial keys, key-loggers, brute-force software, or any other number of features, possibly including an entire system-on-a-disk. A hacker's magic disk is akin to a plumber's tool belt or a mechanic's toolbox. It contains all the essential items that the person needs to do their job once they gain physical access.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What do hackers use magic discs for?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is a combination of hardware and software that you use to control the computer?

Are you mentioning about the partition magic discs


Can you make pirated discs work without swap magic?

Yes, if you use a mod chip or blindwrite it


What does the Magic Disc software program do?

Magic Disc is a free toll that allows users to create virtual discs in CD or DVD-ROM format that play like actual physical discs. The product is developed by MagicISO and offered for download on CNET.


Is Smaller computers and devices cannot use optical storage discs?

False, They can use optical storage discs.


Can you play PS3 games on ps2 with swap magic?

no. The PS3 games are on Blu-ray discs that the PS2 does not read.


What do hackers use to do just about anything you can do with your computer?

They generally use code they right...


If you use recovery media discs will your computer be restored to its original state or the state it was in when the discs were burnt?

It will be in its original state.


How can you protect your pcs from hackers?

password it, disconnect it from the internet or use a firewall


What do hackers use to access and delete all files on your computer?

Your password.


Why do they call phone hackers Trojans?

They call them Trojans because of the Trojan horse. The Trojans use a horse to get into the kingdom just like phone hackers (Trojans) use ads and apps made by them to get into your phone.


Can you use ink pens on DVD discs?

heck no!!


What are different types of hackers?

Black Hat: Criminal Hackers White Hat: Authorized Hackers Grey Hat: “Just for Fun” Hackers Script Kiddies: Ametuer Hackers Green Hat: Hackers-in-Training Blue Hat: Authorized Software Hackers Red Hat: Government-Hired Hackers State/Nation Sponsored Hackers: International Threat Prevention